Skip to main content

New Advancements in Cybersecurity: A Comprehensive Survey

  • Chapter
  • First Online:
Big Data Analytics and Computational Intelligence for Cybersecurity

Part of the book series: Studies in Big Data ((SBD,volume 111))

Abstract

World is now considered as global village because of interconnected networks. Smart phones and large computing devices exchange millions of information each day. Information or data privacy is first priority for any tech company. Information security get attention both from academia and industry sectors for the purpose of data prevention, integrity and data modification. Traditional and mathematical security models are implemented to address information related issues but does not provide full proof data privacy. Computational Intelligence is power technique inspired from biological development and act as intelligent agent which detects treats in real and complex environments. Computational Intelligence is further sub divided in to Fuzzy Logic, Evaluation Computation, Artificial Neural Networks and hybrid approach. In this research study each branch of Computational Intelligence is studied from cybersecurity point of view with its merits and demerits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Dorbala, R. Bhadoria, Analysis for security attacks in cyberphysical systems, in Cyber-Physical Systems: A Computational Perspective (Chapman & Hall, London, U.K., 2015), pp. 395–414

    Google Scholar 

  2. S.K. Khaitan, J.D. McCalley, Design techniques and applications of cyberphysical systems: A survey. IEEE Syst. J. 9(2), 350–365 (2015)

    Article  Google Scholar 

  3. R. Kabir, A.R. Onik, T. Samad, A network intrusion detection framework based on bayesian network using wrapper approach. Int. J. Comput. Appl. 166, 13–17 (2017)

    Google Scholar 

  4. V. Kumar, D. Sinha, A.K. Das, S.C. Pandey, R.T. Goswami, An integrated rule-based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Clust. Comput. 23(2), 1397–1418 (2020)

    Google Scholar 

  5. X. Larriva-Novo, C. Sánchez-Zas, V.A. Villagrá, M. Vega-Barbas, D. Rivera, An approach for the application of a dynamic multi-class classifier for network intrusion detection systems. Electronics 9(11), 1759 (2020)

    Article  Google Scholar 

  6. H. Alqahtani, I.H. Sarker, A. Kalim, S.M.M. Hossain, S. Ikhlaq, S. Hossain, Cyber intrusion detection using machine learning classification techniques, in International Conference on Computing Science, Communication and Security (Springer, Singapore, 2020), pp. 121–131

    Google Scholar 

  7. D. Gümüşbaş, T. Yıldırım, A. Genovese, F. Scotti, A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Syst. J. (2020)

    Google Scholar 

  8. O. Savas, J. Deng, Big Data Analytics in Cybersecurity (Auerbach, New York, NY, USA, 2017)

    Book  Google Scholar 

  9. A.F. de Retana, A. Miranda-García, Á.M. Guerrero, C. Fernández-Llamas, Attacks detection on sampled netflow traffic through image analysis with convolutional neural networks (CNN), in Computational Intelligence in Security for Information Systems Conference (Springer, Cham, 2021), pp. 33–40

    Google Scholar 

  10. C. Kemp, C. Calvert, T.M. Khoshgoftaar, Detection methods of slow read DoS using full packet capture data, in 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI) (IEEE, 2020), pp. 9–16

    Google Scholar 

  11. M. Fejrskov, J.M. Pedersen, E. Vasilomanolakis, Using NetFlow to measure the impact of deploying DNS-based blacklists, in International Conference on Security and Privacy in Communication Systems (Springer, Cham, 2021), pp. 476–496

    Google Scholar 

  12. R. Iqbal, F. Doctor, B. More, S. Mahmud, U. Yousuf, Big data analytics: computational intelligence techniques and application areas. Technol. Forecast. Soc. Chang. 1–13 (2018). https://doi.org/10.1016/j.techfore.2018.03.024

  13. R.V. Kulkarni, A. Forster, G.K. Venayagamoorthy, Computational intelligence in wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 13(1), 68–96 (2011)

    Article  Google Scholar 

  14. E.M. El-Alfy, W.S. Awad, Computational intelligence paradigms: an overview, in Proc. Improving Inf. Secur. Pract. Through Comput. Intell. (2016), pp. 1–27

    Google Scholar 

  15. S. Fazli, M. Kiamini, A high performance steganographic method using JPEG and PSO algorithm, in Proc. Int. Conf. IEEE Multitopic (2008), pp. 100–105

    Google Scholar 

  16. F.H. Rabevohitra, J. Sang, High capacity steganographic scheme for JPEG compression using particle swarm optimization. Adv. Mater. Res. 433, 5118–5122 (2012)

    Article  Google Scholar 

  17. C. Chang, C. Lin, Y. Fan, Lossless data hiding for color images based on block truncation coding. Pattern Recognit. 41(7), 2347–2357 (2008)

    Article  Google Scholar 

  18. K. Bhowal, A.J. Pal, G.S. Tomar, P.P. Sarkar, Audio steganography using GA, in Proc. Int. Conf. Comput. Intell. Commun. Netw. (2010), pp. 449–453

    Google Scholar 

  19. M. Khodaei, K. Faez, Image hiding by using genetic algorithm and LSB substitution, in Proc. Int. Conf. Image Signal Process (Berlin, Germany, 2010), pp. 404–411

    Google Scholar 

  20. S. Sonawane, S. Karsoliya, P. Saurabh, B. Verma, Self configuring intrusion detection system, in Proc. 4th Int. Conf. Comput. Intell. Commun. Netw. (2012), pp. 757–761

    Google Scholar 

  21. A. Ahmad, S.B. Maynard, S. Park, Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25(2), 357–370 (2014)

    Article  Google Scholar 

  22. N. Siddique, H. Adeli, Computational intelligence: synergies of fuzzy logic, in Neural Networks and Evolutionary Computing (Wiley, New York, NY, USA, 2013)

    Google Scholar 

  23. S. Liu, J. Sullivan, J. Ormaner, A practical approach to enterprise IT security. IT Prof. 5, 35–42 (2001)

    Article  Google Scholar 

  24. H. Kumar, Computational intelligence approach for flow shop scheduling problem, in Handbook of Research on Emergent Applications of Optimization Algorithms (IGI Global, Hershey, PA, USA, 2018), pp. 298–313

    Google Scholar 

  25. I. Onat, A. Miri, An intrusion detection system for wireless sensor networks, in Proc. Int. Conf. IEEE Wireless Mobile Comput. Netw. Commun., vol. 3 (2005), pp. 253–259

    Google Scholar 

  26. W. Lee, D. Xiang, Information-theoretic measures for anomaly detection, in Proc. Int. Symp. IEEE Secur. Privacy (2001), pp. 130–143

    Google Scholar 

  27. H. Cavusoglu, B. Mishra, S. Raghunathan, The value of intrusion detection systems in information technology security architecture. Inf. Syst. Res. 16(1), 28–46 (2005)

    Article  Google Scholar 

  28. J. D’Arcy, T. Herath, M.K. Shoss, Understanding employee responses to stressful information security requirements: a coping perspective. J. Manag. Inf. Syst. 31(2), 285–318 (2014)

    Article  Google Scholar 

  29. L. Jobson, A. Stanbury, P.E. Langdon, The self-and other-deception questionnaires-intellectual disabilities (SDQ-ID and ODQ-ID): component analysis and reliability. Res. Dev. Disabil. 34(10), 3576–3582 (2013)

    Article  Google Scholar 

  30. L.A. Zadeh, Fuzzy logic, neural networks, and soft computing, in Fuzzy Sets, Fuzzy Logic, and Fuzzy System (World Scientific, Singapore, 1996), pp. 775–782

    Google Scholar 

  31. D. Gmach, S. Krompass, A. Scholz, M. Wimmer, A. Kemper, Adaptive quality of service management for enterprise services. ACM Trans. Web. 2(1), 8 (2008)

    Google Scholar 

  32. S. Seltzsam, D.L. Gmach, S. Krompass, A. Kemper, Autoglobe: an automatic administration concept for service-oriented database applications, in Proc. 22nd Int. Conf. Data Eng. (2006), p. 90

    Google Scholar 

  33. L.A. Zadeh, Fuzzy logic computing with words. IEEE Trans. Fuzzy Syst. 4(2), 103–111 (1996)

    Article  Google Scholar 

  34. J. Lu, R. Wang, An enhanced fuzzy linear regression model with more flexible spreads. Fuzzy Sets Syst. 160(17), 2505–2523 (2009)

    Article  MathSciNet  Google Scholar 

  35. Y. Zeng, M. Zhou, R. Wang, Similarity measure based on nonlinear compensatory model and fuzzy logic inference, in Proc. Int. Conf. IEEE Granular Comput. (2005), pp. 342–345

    Google Scholar 

  36. H. Duman, H. Hagras, V. Callaghan, A multi-society-based intelligent association discovery and selection for ambient intelligence environments. ACM Trans. Auton. Adapt. Syst. 5(2), 7 (2010)

    Google Scholar 

  37. S. Bagchi, A fuzzy algorithm for dynamically adaptive multimedia streaming. ACM Trans. Multimed. Comput. Commun. Appl. 7(2), 11 (2011)

    Google Scholar 

  38. K. Kolomvatsos, C. Anagnostopoulos, S. Hadjiefthymiades, A fuzzy logic system for bargaining in information markets. ACM Trans. Intell. Syst. Technol. 3(2), 32 (2012)

    Google Scholar 

  39. J. Zhan, X. Luo, K.M. Sim, C. Feng, Y. Zhang, A fuzzy logic-based model of a bargaining game, in Proc. Int. Conf. Knowl. Sci., Eng. Manage. (Berlin, Germany, 2013), pp. 387–403

    Google Scholar 

  40. N. Naik, R. Diao, Q. Shen, Dynamic fuzzy rule interpolation and its application to intrusion detection. IEEE Trans. Fuzzy Syst. 26(4), 1878–1892 (2018)

    Article  Google Scholar 

  41. A.K. Choudhary, A. Swarup, Neural network approach for intrusion detection, in Proc. 2nd Int. Conf. Interact. Sci. Inf. Technol. Culture Human (2009), pp. 1297–1301

    Google Scholar 

  42. H. Yakura, S. Shinozaki, R. Nishimura, Y. Oyama, J. Sakuma, Malware analysis of imaged binary samples by convolutional neural network with attention mechanism, in Proc. 8th ACM Conf. Data Appl. Secur. Privacy (2018), pp. 127–134

    Google Scholar 

  43. M. Zheng, S. Zhong, S. Wu, J. Jiang, Steganographer detection based on multiclass dilated residual networks, in Proc. Int. Conf. ACM Multimedia Retrieval (2018), pp. 300–308

    Google Scholar 

  44. J. Yang, C. Eickhoff, Unsupervised learning of parsimonious general-purpose embeddings for user and location modeling. ACM Trans. Inf. Syst. 36(3), 1–33 (2018)

    Article  Google Scholar 

  45. R. Wang, W. Ji, Computational intelligence for information security: a survey. IEEE Trans. Emerg. Top. Comput. Intell. 4(5), 616–629 (2020)

    Article  Google Scholar 

  46. N.N. El-Emam, R.A.S. Al-Zubidy, New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Softw. 86(6), 1465–1481 (2013)

    Article  Google Scholar 

  47. S. Doğan, A new data hiding method based on chaos embedded genetic algorithm for color image. Artif. Intell. Rev. 46(1), 129–143 (2016)

    Google Scholar 

  48. W. Weimer, T.V. Nguyen, C.L. Goues, S. Forrest, Automatically finding patches using genetic programming, in Proc. 31st Int. Conf. Softw. Eng. (2009), pp. 364–374

    Google Scholar 

  49. G. Folino, F.S. Pisani, Combining ensemble of classifiers by using genetic programming for cyber security applications, in Proc. Eur. Conf. Appl. Evol. Comput. (2015), pp. 54–66

    Google Scholar 

  50. G. Folino, F.S. Pisani, P. Sabatino, An incremental ensemble evolved by using genetic programming to efficiently detect drifts in cyber security datasets, in Proc. Int. Conf. Genetic Evol. Comput. (2016), pp. 1103–1110

    Google Scholar 

  51. S. Malhotra, V. Bali, K.K. Paliwal, Genetic programming and K-nearest neighbor classifier-based intrusion detection model, in Proc. 7th Int. Conf. Cloud Comput., Data Sci. Eng. (2017), pp. 42–46

    Google Scholar 

  52. N. Feng, H.J. Wang, M. Li, A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis. Inf. Sci. 256, 57–73 (2014)

    Article  Google Scholar 

  53. F. Hosseinpour, P.V. Amoli, F. Farahnakian, J. Plosila, T. Hämäläinen, Artificial immune system based intrusion detection: innate immunity using an unsupervised learning approach. Int. J. Digit. Content Technol. Appl. 8(5), 1–12 (2014)

    Google Scholar 

  54. T. Ahmad, S. Ali, S.B.H. Shah et al., Joint mode selection and user association in D2D enabled multitier C-RAN. Clust. Comput (2022). https://doi.org/10.1007/s10586-021-03456-4

    Article  Google Scholar 

  55. S. Ali, M. Sohail, S.B.H. Shah, D. Koundal, M.A. Hassan, A. Abdollahi, I.U. Khan, New trends and advancement in next generation mobile wireless communication (6G): a survey. Wirel. Commun. Mob. Comput. 2021, (2021)

    Google Scholar 

  56. I.U. Khan, M.A. Hassan, M. Fayaz, J. Gwak, M.A. Aziz, Improved sequencing heuristic DSDV protocol using nomadic mobility model for FANETS. Comput. Mater. Contin. 70(2), 3653–3666 (2022)

    Google Scholar 

  57. I.U. Khan, M.A. Hassan, M.D. Alshehri, M.A. Ikram, H.J. Alyamani, R. Alturki, V.T. Hoang, Monitoring system-based flying IoT in public health and sports using ant-enabled energy-aware routing. J. Healthc. Eng. 2021, (2021)

    Google Scholar 

  58. M.A. Hassan, S.I. Ullah, A. Salam, A.W. Ullah, M. Imad, F. Ullah, Energy efficient hierarchical based fish eye state routing protocol for flying ad-hoc networks. Indones. J. Electr. Eng. Comput. Sci. 21(1), 465–471 (2021)

    Google Scholar 

  59. M.A. Hassan, S.I. Ullah, I.U. Khan, S.B. Hussain Shah, A. Salam, A.W. Ullah Khan, Unmanned aerial vehicles routing formation using fisheye state routing for flying ad-hoc networks, in The 4th International Conference on Future Networks and Distributed Systems (ICFNDS) (2020), pp. 1–7

    Google Scholar 

  60. H. Chen, et al., Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research, in Proc. Nat. Conf. Digital Government Res. (2005), pp. 112–113

    Google Scholar 

  61. G. Acampora, M. Gaeta, V. Loia, A.V. Vasilakos, Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Trans. Auton. Adapt. Syst. 5(2), 8 (2010)

    Google Scholar 

  62. K. Xi, J. Hu, B.V.K. Kumar, FE-SViT: a SViT-based fuzzy extractor framework. ACM Trans. Embed. Comput. Syst. 15(4), 78 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Abul Hassan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hassan, M.A., Ali, S., Imad, M., Bibi, S. (2022). New Advancements in Cybersecurity: A Comprehensive Survey. In: Ouaissa, M., Boulouard, Z., Ouaissa, M., Khan, I.U., Kaosar, M. (eds) Big Data Analytics and Computational Intelligence for Cybersecurity. Studies in Big Data, vol 111. Springer, Cham. https://doi.org/10.1007/978-3-031-05752-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-05752-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-05751-9

  • Online ISBN: 978-3-031-05752-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics